Automated Building’s December Theme: “Creating Your Collaboration”

automatedbuildings Special note from Ken Sinclair: The December issue is Automated Buildings’ AHRExpo 2015 Chicago preview. Editorial excerpt: “Our December theme ‘Creating your Collaboration’ started with my puzzling with the process of how industry knowledge gets past on. AHRExpo is the annual event where we present our free education sessions to the industry. This is our 16th year of presenting these sessions and hosting the third annual Connection Community Collaboratory meeting. Online Collaboration is how today’s education occurs.

Education is not an affair of “telling and being told” but an active process; I am a poor presenter but a good connector of concepts and resources for the active process. As a connector of concepts and resources I need to be questioned by those seeking knowledge to be of use. My value is not the knowledge that I can share, but the knowledge I can connect folks to so they can self-teach themselves their way. I am but a catalyst in the process of learning.

I am still struggling with the best way to transfer the industry dumps of information to incoming practitioners of our industry. We came to call this “The Dinosaur Dump” when we dropped 20 to 30 years of industry experience on some poor incoming practitioners who did not even ask one question…” Read complete editorial!

First Hack was in 1903: Wikipedia’s Timeline of Computer Security Hacker History

Dot-DashAccording to Wikipedia (in the midst of a donation drive), the origins of Cyber-attacks can be traced back to the first “hacking,” which took place in 1903 “when magician and inventor Nevil Maskelyne disrupts John Ambrose Fleming’s public demonstration of Guglielmo Marconi’s purportedly secure wireless telegraphy technology, sending insulting Morse code messages through the auditorium’s projector.” Maskelyne’s motives were twofold: first, to disprove Marconi’s boasts about a secure transmission, and second, a mild revenge motive brought on by Marconi’s broad patents and wealth. which were stifling Maskelyne’s own genius ambitions.

Bitcoin_logo.svgWikipedia’s final timeline entry is February 7, 2014: Bitcoin exchange Mt.Gox filed for bankruptcy after $460 million was apparently stolen by hackers due to “weaknesses in [their] system” and another $27.4 million went missing from its bank accounts.

Excerpted from: NewScientist. “In 1903, Marconi claimed that his wireless messages could be sent privately over great distances. “I can tune my instruments so that no other instrument that is not similarly tuned can tap my messages,” Marconi boasted to London’s St James Gazette in February 1903.

That things would not go smoothly for Marconi and Fleming at the Royal Institution that day in June was soon apparent. Minutes before Fleming was due to receive Marconi’s Morse messages from Cornwall, the hush was broken by a rhythmic ticking noise sputtering from the theatre’s brass projection lantern, used to display the lecturer’s slides. To the untrained ear, it sounded like a projector on the blink. But Arthur Blok, Fleming’s assistant, quickly recognised the tippity-tap of a human hand keying a message in Morse. Someone, Blok reasoned, was beaming powerful wireless pulses into the theatre and they were strong enough to interfere with the projector’s electric arc discharge lamp.

Mentally decoding the missive, Blok realised it was spelling one facetious word, over and over: “Rats”. A glance at the output of the nearby Morse printer confirmed this. The incoming Morse then got more personal, mocking Marconi: “There was a young fellow of Italy, who diddled the public quite prettily,” it trilled. Further rude epithets – apposite lines from Shakespeare – followed.

The stream of invective ceased moments before Marconi’s signals from Poldhu arrived. The demo continued, but the damage was done: if somebody could intrude on the wireless frequency in such a way, it was clearly nowhere near as secure as Marconi claimed. And it was likely that they could eavesdrop on supposedly private messages too.

Marconi would have been peeved, to say the least, but he did not respond directly to the insults in public. He had no truck with sceptics and naysayers: “I will not demonstrate to any man who throws doubt upon the system,” he said at the time. Fleming, however, fired off a fuming letter to The Times of London. He dubbed the hack “scientific hooliganism”, and “an outrage against the traditions of the Royal Institution”. He asked the newspaper’s readers to help him find the culprit.

He didn’t have to wait long. Four days later a gleeful letter confessing to the hack was printed by The Times. The writer justified his actions on the grounds of the security holes it revealed for the public good. Its author was Nevil Maskelyne, a mustachioed 39-year-old British music hall magician. Maskelyne came from an inventive family – his father came up with the coin-activated “spend-a-penny” locks in pay toilets. Maskelyne, however, was more interested in wireless technology, so taught himself the principles. He would use Morse code in “mind-reading” magic tricks to secretly communicate with a stooge. He worked out how to use a spark-gap transmitter to remotely ignite gunpowder. And in 1900, Maskelyne sent wireless messages between a ground station and a balloon 10 miles away. But, as author Sungook Hong relates in the book Wireless, his ambitions were frustrated by Marconi’s broad patents, leaving him embittered towards the Italian. Maskelyne would soon find a way to vent his spleen.”

Read more!

We Need to Talk: Intel’s MICA — My Intelligent Communications Accessory

MICA_NEARMEOkay, this version is a limited featured, fashion accessory for stylish women, but a few beefed-up wearable siblings, with shock-proof and waterproof features, can’t be far behind. This is the CONTEXTUALIZATION PRINCIPAL’s best example so far — that has figured out, “INTELigently,” how to claim enough wearable body real estate without significant negative consequence, and takes the lead as the Star-Trecky IoT game-changer that will link every aspect of your life to a connected device worn on your wrist. Get your VISAs out, it’ll probably be ready for your holiday purchases. Read more on Intel’s website!

Niagara Analytics Framework Webinars! Register Now for Information and Demo!!

TridiumNIAGARA ANALYTICS FRAMEWORK WEBINARS! Be sure to register for more information and a demo!

Tridium’s new data analytics platform has all of the appealing hallmarks of the truly open Niagara Framework®, enabling you to leverage its power to transform data into actionable information. It combines a historical perspective with real-time insight, moving you from a reactive response to a more powerful proactive position. It’s easy to use and requires no specialized programming skills, yet it gives you advanced analytics.

Register for one of our informational webinars that will feature a demo:

Tuesday, Nov. 18, at 11 a.m., Eastern

Wednesday, Nov. 19, at 2 p.m., Eastern

Monday, Nov. 24, at 11 a.m., Eastern

Tuesday, Nov. 25, at 2 p.m., Eastern

Tuesday, Dec. 2, at 11 a.m., Eastern

Thursday, Dec. 4, at 2 p.m., Eastern

We invite those of you who haven’t done so already to visit the Niagara Analytics Framework website to join our Early Adopter Program, which is filling fast. Be among the first to experience the power of this new product. Early adopters receive:

Niagara Analytics Framework certification training for one person; One Niagara Analytics starter license; Invitation to participate in a monthly contest in 2015 for visibility within the Niagara community, recognition at the 2016 Niagara Summit and the opportunity to win a grand prize.

Space is reserved for the first 200 eligible participants who join before the November 21 deadline.


Cyber Security for Oil and Gas Summit Canada, Early Bird Rates End November 14th!

Cybersecurity_Canada An invitation from Carrie Simon, Marketing Manager, IQPC: “I would like to inform you that IQPC’s Cyber Security for Oil and Gas Summit Canada agenda is now available for download! This year’s summit will include elite speakers and engaging panel discussions.”

Cyber Security for Oil and Gas Summit Canada will provide you with industry-specific insight to get your information/cyber security team prepared to overcome challenges like targeted cyber attacks and data loss and exploitation. You can also look forward to learning how to effectively manage the risks of operating in a threat landscape in order to advance your corporate goals by aligning information & cyber security to enable better business practices.

To view the just released 2014 agenda click here or visit To receive a copy directly, email me at

Confirmed Speakers Include:
Zoltan Palmai, Team Lead, Network Security – Security & Access Operations IRSM, Chevron
Craig Coughlan, Supervisor Incident Response Threat Assessment, Enbridge
James Williamson, IT Compliance & Risk, Enbridge
Hani Mansi, Director, Risk & Information Security, ATCO
Richard Rowlandson, Network Security Analyst, AECOM
Staff Sergeant Ryan Jepson, Electronic Surveillance Unit, Calgary Police Service
Senior Constable Shafik Punja, Technological Crimes Team (TCT), Calgary Police Service
Geoff Shukin, Senior SE Western Canada, Palo Alto Networks
Vincent Chiew, President & Co-Founder, (ISC)2
Owen Key, CSO, City of Calgary

Oil & Gas Cyber Security 2014: Threats & Countermeasures: Cyber attacks have become the scourge of the Information Age. In a recent report by Think Tank and publisher, the Council on Foreign Relations (CFR), the global energy sector was cited as the most vulnerable global industry to cyber incursion. With this in mind, we surveyed our database of IT and cyber security professionals to see what they thought about threats to the hydrocarbon industry.

You can download the infographic here. To receive a copy via email, you can contact me directly at

Pricing & Registration Information: Reserve your spot by November 14th and take advantage of our early bird rates to save $500 OFF standard pricing. To receive the early bird discount, enter the promo code: COS_MCD.

To register, visit, call 1-800- 882-8684 or email

Ken Sinclair’s November Edition of Automated Buildings: The “I of Me” of IoT

IoTavnet Excerpt from Ken Sinclair’s comments on IoT: “Your present IoT understanding, which I choose to whimsically call “The I of Me” greatly controls your comprehension and expectations of what those three letters might mean to you and those around you. The art, science, and social interaction of our time “The Internet of Things” (IoT), reflects life and is affecting all of our lives daily so get over it.” Click here for complete article.

Another flurry of great articles in’s November Issue featuring:

Standardizing the Internet of Things by Jim Sinopoli, Smart Buildings LLC

IoT is Changing Facility Management by Eric Graham, CrowdComfort

Wearable Technologies — Is this the Next Thing? by Chip Pieper

Haystack Connect 2015 by John Petze, Marc Petock, Project Haystack

The Cutting-Edge of IoT by Therese Sullivan, BuildingContext Ltd

Coil “Crime Scene” Investigation by Dean Taylor, Jim Lee, Cimetrics Inc.

USGBC and a new Electric Standard by Jack McGowan, The McGowan Group

Let There be Lighting Control by Roger Woodward, Tridium Europe

Return on Internet of Things Investments? by Allan McHale, Memoori

Is Your Office a Downer? by Bob Best, JLL

#NaaS (Niagara as a Service) by Rav Panchalingam, VAE Group

Echelon Goes “All In” on IoT by Allan McHale, Memoori

Data Center Infrastructure Management by Sev Onyshkevych, FieldView Solutions.

Tridium Launches New Niagara Analytics Framework

TridiumPut the power of the new Niagara Analytics Framework to work for your business! Early Adopter Space is reserved for the first 200 eligible participants. Join before the November 21 deadline.

Tridium is excited to announce the availability of the new Niagara Analytics Framework* – the only data analytics engine native to Niagara. This powerful new product will enable you to leverage the power of Niagara to shrink big data and grow performance. The new Niagara Analytics Framework can be used in any industry or with any application. It runs on any system that produces data and can be applied to any operation.

What this means for you:

It has all the appealing hallmarks of the truly open Niagara platform, enabling you to leverage its power to transform data into actionable information.
It combines a historical perspective with real-time insight, moving you from a reactive response to a more powerful proactive position.
It’s easy to use and requires no specialized programming skills, yet it gives you advanced analytics.

Introducing our Early Adopter Program

We invite you to be among the first to experience the power of the Niagara Analytics Framework. Join our Early Adopter Program to receive:
Special introductory pricing on a starter license;
Niagara Analytics Framework certification training for one person;
Invitation to participate in a monthly contest in 2015 for visibility within the Niagara community, recognition at the 2016 Niagara Summit and the opportunity to win a grand prize;
Space is reserved for the first 200 eligible participants who join before the November 21 deadline.

We look forward to giving you more information and welcoming you to our Early Adopter Program so that you can begin using the framework to drive efficiency and capture cost savings.

*The Niagara Analytics Framework runs on NiagaraAX SupervisorTM and uses the standard Niagara toolset. It’s compatible with NiagaraAX 3.7.106 or later. Our open API supports third-party visualization and other complementary apps.

CoRE Tech 2014 – The Number One Program on Corporate Real Estate Innovation in the World!

A message from Jim Young, Co-Founder and CEO CoRE Tech: There are many moving parts in managing the real estate assets of a corporation; hundreds of processes, a great amount of data and many analog tools. Because of this, innovation, technology and automation will continue to significantly impact how we use and operate corporate facilities.

CoRE Tech 2014 will be at the epicenter of the Corporate Real Estate and Facility transformation. We have assembled the most innovative users of space, the ones taking the risks along with the solution providers at the forefront of these changes, all in one place.

There is simply no other place, no other education program in the world, that focuses on transforming corporate real estate and facilities through the use of innovation, technology or automation.

2014 ICS Cyber Security Conference October 20-23, 2014 in Atlanta, GA

ics_cybersecurityAs the longest-running cyber security-focused conference for the industrial control systems sector, the 2014 ICS Conference will cater to the energy, utility, chemical, transportation, manufacturing, and other industrial and critical infrastructure organizations. The conference will address topics covering ICSs, including protection for SCADA systems, plant control systems, engineering workstations, substation equipment, programmable logic controllers (PLCs), and other field control system devices.

The 2014 ICS Cyber Security Conference will address the myriad cyber threats facing operators of ICS around the world, and will address topics covering ICSs, including protection for SCADA systems, plant control systems, engineering workstations, substation equipment, programmable logic controllers (PLCs), and other field control system devices.

Bigger and better than ever before, select sessions of interest in the 2014 ISC Conference will include:

* A summary and status of the two utilities performing Aurora hardware mitigation projects in conjunction with the Department of Defense
* A summary and status of the two utility ICS cyber security test beds (the equipment is the same as in water, oil/gas, pipelines, chemicals, etc.
* A summary and status of the Department of Defense ICS cyber security test bed
* A summary of the recovery and remediation actions from one the most significant ICS cyber incidents to date – complete loss of DCS logic with plants at power
* A summary of Project Shine findings
Discussions of recent non-North American ICS cyber incidents
* Immerse yourself in the reality of managing a plant under cyber-attack: Play KIPS, the Kaspersky Industrial Protection Simulation

Online Registration!

Building Energy Efficiency Frontiers and Innovation Technologies (BENEFIT) – 2015 Funding Opportunity Announcement

DOE1The Building Technologies Office (BTO)’s Emerging Technologies Program has announced the availability of nearly $8 million under the Building Energy Efficiency Frontiers and Innovations Technologies (BENEFIT) Funding Opportunity Announcement (FOA) DE-FOA-0001166. This FOA combines an early-stage research and development topic (Innovations) with a later-stage research and development topic (Frontiers) that complements the core funding provided to the national labs. The FOA allows all interested parties, including corporations, universities, and non-profits as well as the national labs, to contribute to advancement in two of these core technological areas: non-vapor compression HVAC technologies and advanced vapor compression HVAC technologies. It is anticipated that six awards will be made and range from $500,000 to $1.5 million

Applications for this funding opportunity are open under the following topics:

INNOVATIONS: Non-vapor Compression HVAC Technologies – This topic includes developing approaches and technologies for heating, ventilating, and air conditioning (HVAC) that replace vapor compression technologies, which are currently the dominant HVAC technologies due to their scalability, relatively compact size, high reliability, and other attributes. However, vapor compression technologies make use of conventional refrigerants. This research topic seeks to explore long-term non-vapor compression solutions that result in HVAC equipment that does not use refrigerants. Solutions for both natural gas and for electric HVAC equipment are of interest.

FRONTIERS: Advanced Vapor Compression HVAC Technologies – Regional HVAC solutions offer significant energy saving potential for new construction and the existing building stock. Today’s vapor compression equipment has limited cooling control. This topic seeks to develop equipment optimized for specific environments and that can provide dramatic improvements in energy efficiency with modest increases to equipment costs. Because the building stock increases by only a few percent annually, concepts which are applicable only to new construction will have limited energy savings potential. Therefore, concepts that are applicable to both new construction and retrofits of existing buildings are particularly encouraged.

HOW TO APPLY: This funding opportunity is open to individuals, corporations, universities, non-profits, as well as national labs. The final funding amount is subject to congressional appropriations.